Vulnerability Name: | CCN-22450 | ||||||
Published: | 2005-09-28 | ||||||
Updated: | 2005-09-28 | ||||||
Summary: | WordPress could allow a remote attacker to gain elevated privileges caused by improper stripping of post tags. A remote attacker could create a malicious Web page and insert JavaScript code into the page to execute arbitrary code on the system when the post is read by the victim.
Note: In order to exploit this vulnerability, these conditions must be in place: * - The user account must already be set at level 2 - for making posts * - The Admin needs to be using a JavaScript Web browser * - Server installation must include PHP and the cURL extension. | ||||||
CVSS v3 Severity: | 5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
| ||||||
CVSS v2 Severity: | 6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||
Vulnerability Consequences: | Gain Privileges | ||||||
References: | Source: CCN Type: WordPress Web site WordPress Source: CCN Type: SecuriTeam Security Advisory 9-28-2005 WordPress User Privilege Escalation Source: XF Type: UNKNOWN wordpress-gain-privilege(22450) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |